{"vulnerability": "CVE-2025-27816", "sightings": [{"uuid": "0e4d22c8-2eb8-4cec-9343-3df40ed016de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27816", "type": "seen", "source": "Telegram/r5oeIRpqLRgNyGLLE_7wMh8Fn_0oWi6wa9pBcaHydN7bfKh0", "content": "", "creation_timestamp": "2025-03-08T04:35:53.000000Z"}, {"uuid": "c60c2ab3-0af4-4b9d-b724-3a032b208731", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27816", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljt7pyqqkb26", "content": "", "creation_timestamp": "2025-03-08T00:00:09.058964Z"}, {"uuid": "6cdff207-bd4c-426d-b2a8-f59319fb897e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27816", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6823", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27816\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N)\n\ud83d\udd39 Description: A vulnerability was discovered in the Arctera InfoScale 7.0 through 8.0.2 where a .NET remoting endpoint can be exploited due to the insecure deserialization of potentially untrusted messages. The vulnerability is present in the Windows Plugin_Host service, which runs on all the servers where InfoScale is installed. The service is used only when applications are configured for Disaster Recovery (DR) using the DR wizard. Disabling the Plugin_Host service manually will eliminate the vulnerability.\n\ud83d\udccf Published: 2025-03-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-07T07:39:19.824Z\n\ud83d\udd17 References:\n1. https://www.veritas.com/content/support/en_US/security/ARC25-002", "creation_timestamp": "2025-03-07T08:35:13.000000Z"}, {"uuid": "ef6aa58c-4d59-4adb-a450-632f84969d89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27816", "type": "seen", "source": "Telegram/n12tkstpTBiha-g5cLpVGt34jbEMyCrF8bAKommPg_u2Wg4", "content": "", "creation_timestamp": "2025-03-07T10:01:20.000000Z"}, {"uuid": "6387a419-1e48-4da6-9086-7bac08470b8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27816", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lk34dxeo3k2k", "content": "", "creation_timestamp": "2025-03-11T03:21:02.806674Z"}, {"uuid": "8fa06afe-e9af-4110-aaa1-b1606906b1bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27816", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}, {"uuid": "add7969b-d9b2-48b4-a83f-6018d620b299", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27816", "type": "seen", "source": "https://t.me/cvedetector/19789", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27816 - Arctera InfoScale .NET Remoting Insecure Deserialization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27816 \nPublished : March 7, 2025, 8:15 a.m. | 45\u00a0minutes ago \nDescription : A vulnerability was discovered in the Arctera InfoScale 7.0 through 8.0.2 where a .NET remoting endpoint can be exploited due to the insecure deserialization of potentially untrusted messages. The vulnerability is present in the Windows Plugin_Host service, which runs on all the servers where InfoScale is installed. The service is used only when applications are configured for Disaster Recovery (DR) using the DR wizard. Disabling the Plugin_Host service manually will eliminate the vulnerability. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T10:45:10.000000Z"}, {"uuid": "eacf7cbe-0ee9-47bd-8334-44178418093b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-27816", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lk3kdkxvbk27", "content": "", "creation_timestamp": "2025-03-11T07:31:19.074920Z"}, {"uuid": "9d0826ea-868a-4731-a28c-b0de2b355869", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27816", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljuhxhahmv2m", "content": "", "creation_timestamp": "2025-03-08T12:00:06.871900Z"}, {"uuid": "542e43bf-6964-49b6-a6b5-93eaa655656a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27816", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljrlz526dj2f", "content": "", "creation_timestamp": "2025-03-07T08:34:38.966193Z"}, {"uuid": "d2432e96-9605-40b4-bef9-92de10ebd5ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27816", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114120519521591097", "content": "", "creation_timestamp": "2025-03-07T09:48:56.012294Z"}, {"uuid": "c8a5aea0-60a8-449d-8a8e-424eb01e6a6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27816", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:31.000000Z"}]}